THTLocker Ransomware
Posted: October 3, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 30 |
First Seen: | October 3, 2017 |
---|---|
Last Seen: | March 1, 2023 |
OS(es) Affected: | Windows |
The THTLocker Ransomware is a Trojan that blocks your desktop with a pop-up and also may attempt to encrypt or delete local media, such as videos and pictures. Although the THTLocker Ransomware's campaign is targeting Russian speakers, its screen-locking function may block your access to programs or files, regardless of your IP address's implied geolocation or your system's language settings. Use any of the solutions described in this article for help with disabling and removing the THTLocker Ransomware safely.
The Bright Hue of Your Screen Locking You Outside
In the last, few days of September, malware researchers just became aware of a new, screen-locking threat. While the Trojan only has features for blocking the victim's monitor, its early stage of development implies that its threat actor may plan to add other futures, later, such as harmful encryption or ransom-themed messages. As usual, the new Trojan, THTLocker Ransomware, is a hazard for most PCs running the Windows operating system.
The THTLocker Ransomware's sole attack function that malware researchers can confirm as working is its 'screen-locker' feature. When running, the THTLocker Ransomware loads a maximized HTML window with an obfuscated border. The Trojan provides two messages, one in Russian, claiming to have affected your files, while the English one delivers a generic screen-locking alert in inexpert grammar. This stage of the THTLocker Ransomware's development doesn't display other, more advanced elements, such as timers, configurable fields for ransom-paying transactions, or specific demands for money.
Future builds of the THTLocker Ransomware may include other security risks. Malware researchers rate the most likely updates to the THTLocker Ransomware as follows:
- The THTLocker Ransomware may search your directories for files related to workplace data or recreational belongings, such as pictures, spreadsheets, or databases, and encrypt them using an algorithm, such as Rijndael. An encrypted file must be decrypted with a specialized code before it can open again in its associated programs.
- The THTLocker Ransomware also may establish a network connection to upload system information or to notify the threat actor about a successful attack. Some Trojans of the THTLocker Ransomware's category also include 'spyware' features that pass over passwords and similar, sensitive info.
- You also may find that backups, particularly Shadow Copy-related data, are deleted by the THTLocker Ransomware automatically.
Recoloring Your Monitor without a Con Artist's Assistance
A minority of security researchers investigating the THTLocker Ransomware are presuming it as being another variant of Hidden Tear's Onion3Cry Ransomware branch. The analyses of malware experts can't corroborate this conclusion, at this time, although a majority of security products are identifying the THTLocker Ransomware as a generic, file-locking threat. The versions of the THTLocker Ransomware available, so far, also give no information on how the Trojan might install itself, but email, torrents, and website exploit kits are all possible means of ingress.
For Windows systems that the THTLocker Ransomware is compatible with, the Alt + F4 shortcut allows the user to terminate any currently-in-focus window, including this Trojan's pop-up. However, doing so only suppresses its symptoms temporarily, and malware researchers recommend that most users reboot into Safe Mode for regaining complete control over the UI. Update your anti-malware programs, if appropriate, before scanning your PC to delete the THTLocker Ransomware. While this Trojan has no high-sophistication defenses, such as those belonging to most rootkits, only half of all brands of AV software are detecting it accurately.
Trojans such as the THTLocker Ransomware are examples of how a well-chosen few minutes of effort can translate into hours of frustration for a targeted victim. Displaying a screen-sized pop-up window is a low-effort feature for any threatening software, but is more than adequate at rendering the user helpless temporarily.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:file.exe
File name: file.exeSize: 9.21 KB (9216 bytes)
MD5: ebab0348c7e13181a414d69d3dee367f
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 1, 2023
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.